Abstract:
Un dispositivo de comunicación inalámbrica (12) que comprende: una plataforma informática (13) que tiene 5 firmware (14); y un módulo de verificación de firmware (20) operable para ejecutar una configuración de verificación (65) para recopilar información de firmware (47), en el que la información de firmware es indicativa de una integridad del firmware (14), en el que se recibe la configuración de verificación (65) de otro dispositivo informático (40) a través de una red inalámbrica, y en el que la configuración de verificación (65) comprende además un resultado de verificación predeterminado (37) seleccionado para el dispositivo inalámbrico (12), en el que la configuración de verificación (65) comprende además un esquema de verificación (89), y en el que el módulo de verificación de firmware (20) puede funcionar además para ejecutar el esquema de verificación (89) en el firmware para generar un resultado de prueba de verificación (47), en el que el resultado de prueba de verificación (47) es indicativo de la integridad del firmware, y en el que el módulo de verificación de firmware es operable para comparar el resultado de verificación predeterminado (37) con el resultado de prueba de verificación generado (47) para determinar la integridad del firmware (14), en el que el módulo de verificación de firmware (20) puede funcionar para controlar el dispositivo inalámbrico (12) en caso de que se descubra un firmware incorrecto o alterado impidiendo la capacidad del dispositivo inalámbrico (12) para comunicarse con la red inalámbrica (42).
Abstract:
Detection and management methods and apparatus for wireless devices may include an executable instruction authorization module operable to scan executable instructions on a wireless device, generate a log indicative of a virus or otherwise unauthorized executable instructions based on a received authorization configuration, and forward the log to a user manager. The user manager may be operable to analyze the log and generate an authorization report which may be viewable by an operator to determine the disposition of unauthorized executable instructions. At least one of the executable instruction authorization module, the user manager, and the operator may be operable to generate a control command operable to delete, or otherwise disable, unauthorized executable instructions on the wireless device, or to restore the executable instructions on the wireless device.
Abstract:
Apparatus, methods, processors and machine readable media for verifying the integrity of firmware on a wireless device. Aspects include generating a verification scheme for testing the integrity of firmware on a wireless device and transmitting the verification scheme to the wireless device. The wireless device applies the verification scheme to the firmware and obtains a verification test result, which is forwarded for analysis. An analyzer compares the generated verification test result with a predetermined test result to obtain an integrity determination that indicates the integrity of the firmware. In some aspects, control commands to change an operational characteristic of the wireless device may be generated based on the integrity determination.
Abstract:
Detection and management methods and apparatus for wireless devices may include an executable instruction authorization module operable to scan executable instructions on a wireless device, generate a log indicative of a virus or otherwise unauthorized executable instructions based on a received authorization configuration, and forward the log to a user manager. The user manager may be operable to analyze the log and generate an authorization report which may be viewable by an operator to determine the disposition of unauthorized executable instructions. At least one of the executable instruction authorization module, the user manager, and the operator may be operable to generate a control command operable to delete, or otherwise disable, unauthorized executable instructions on the wireless device, or to restore the executable instructions on the wireless device.
Abstract:
Metodos y aparatos de deteccion y administracion para dispositivo inalambricos pueden incluir un modulo de autorizacion de instruccion ejecutables operable para escanear instrucciones ejecutables en un dispositivo inalambrico, generar un registro que indique un virus o, de otra forma, instrucciones ejecutables no autorizadas con base en una configuracion de autorizacion recibida, y reenviar el registro a un administrador de usuarios; el administrador de usuarios puede operar para analizar el registro y generar un soporte de autorizacion el cual puede ser visto por un operador para determinar la disposicion de instrucciones ejecutables no autorizadas; por lo menos uno del modulo de autorizacion de instrucciones ejecutables, el administrador de usuarios; y el operador puede operar para generar un comando de control que opere a fin de eliminar o, de otra forma, deshabilitar las instrucciones ejecutables no autorizadas en el dispositivo inalambrico, o para restablecer las instrucciones ejecutables en el dispositivo inalambrico.
Abstract:
Apparatus, methods, and programs for protecting data on a wireless device may include a wireless device having a computer platform with a processing engine operable, based upon configurable parameters, to log data access attempt on the wireless device and transmit the log to a remote device. Furthermore, the wireless device may be configured to execute locally and remotely generated control commands on the wireless device, the commands operable to modify an operation of the wireless device. The embodiment may also include an apparatus operable to receive the transmitted log, analyze the received log and transmit a control command to the wireless device. The apparatus may further generate a data access report and make the report available to an authorized user.
Abstract:
Detection and management methods and apparatus for wireless devices (102) may include an executable instruction authorization module (114) operable to scan executable instructions on a wireless device, generate a log (120) indicative of a virus or otherwise unauthorized executable instructions based on a received authorization configuration (118), and forward the log to a user manager (108). The user manager may be operable to analyze the log and generate an authorization report (154) which may be viewable by an operator to determine the disposition of unauthorized executable instructions At least one of the executable instruction authorization module, the user manager, and the operator may be operable to generate a control command operable to delete, or otherwise disable, unauthorized executable instructions on the wireless device, or to restore the executable instructions on the wireless device
Abstract:
Apparatus, methods, processors and machine readable media for verifying the integrity of firmware on a wireless device. Aspects include generating a verification scheme for testing the integrity of firmware on a wireless device and transmitting the verification scheme to the wireless device. The wireless device applies the verification scheme to the firmware and obtains a verification test result, which is forwarded for analysis. An analyzer compares the generated verification test result with a predetermined test result to obtain an integrity determination that indicates the integrity of the firmware. In some aspects, control commands to change an operational characteristic of the wireless device may be generated based on the integrity determination.
Abstract:
Apparatus, methods, and programs for protecting data on a wireless device may include a wireless device having a computer platform with a processing engine operable, based upon configurable parameters, to log data access attempt on the wireless device and transmit the log to a remote device. Furthermore, the wireless device may be configured to execute locally and remotely generated control commands on the wireless device, the commands operable to modify an operation of the wireless device. The embodiment may also include an apparatus operable to receive the transmitted log, analyze the received log and transmit a control command to the wireless device. The apparatus may further generate a data access report and make the report available to an authorized user.